US 11,750,396 B2
Private data processing method, device and medium
Yanan Yu, Beijing (CN); Bo Jing, Beijing (CN); Wei Gao, Beijing (CN); Hao Chen, Beijing (CN); and Shi Yan, Beijing (CN)
Assigned to BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD., Beijing (CN)
Filed by BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD., Beijing (CN)
Filed on Sep. 14, 2020, as Appl. No. 17/20,366.
Claims priority of application No. 201911344958.1 (CN), filed on Dec. 24, 2019.
Prior Publication US 2021/0194698 A1, Jun. 24, 2021
Int. Cl. H04L 9/32 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/3239 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0825 (2013.01); H04L 9/30 (2013.01); H04L 9/50 (2022.05)] 17 Claims
OG exemplary drawing
 
1. A private data processing method, executable by a client, comprising:
according to first operation behavior and associated data when initiating a user request, generating a first operation transaction request through a blockchain deployment protocol deployed in a blockchain node, and transmitting the first operation transaction request to a blockchain network for on-chain storage, wherein the first operation behavior and associated data is configured to verify rationality of the user request;
initiating the user request to an intermediate server according to an input of a user to request the intermediate server to perform intermediate business processing according to the user request and to initiate a target business processing request to a business server, wherein when performing the intermediate business processing, the intermediate server generates a second operation transaction request through a blockchain deployment protocol deployed in a blockchain node according to second operation behavior and associated data, and transmits the second operation transaction request to a blockchain network for on-chain storage, wherein the second operation behavior and associated data is configured to monitor abnormal operations of the intermediate server;
obtaining business result data fed back by the business server based on the target business processing request from the intermediate server, wherein the business result data is encrypted by using an account key of the user; and
decrypting the business result data by using the account key.